Show simple item record

dc.contributor.supervisorPapadaki, Maria
dc.contributor.authorAlsaiari, Hussain
dc.contributor.otherSchool of Engineering, Computing and Mathematicsen_US
dc.date.accessioned2016-12-20T11:52:56Z
dc.date.available2016-12-20T11:52:56Z
dc.date.issued2016
dc.date.issued2016
dc.identifier10362985en_US
dc.identifier.urihttp://hdl.handle.net/10026.1/8145
dc.description.abstract

Complying with a security policy often requires users to create long and complex passwords to protect their accounts. However, remembering such passwords appears difficult for many and may lead to insecure practices, such as choosing weak passwords or writing them down. One-Time Passwords (OTPs) aim to overcome such problems; however, most implemented OTP techniques require special hardware, which not only adds costs, but also raises issues regarding availability. This type of authentication mechanism is mostly adopted by online banking systems to secure their clients’ accounts. However, carrying around authentication tokens was found to be an inconvenient experience for many customers. Not only the inconvenience, but if the token was unavailable, for any reason, this would prevent customers from accessing their accounts securely. In contrast, there is the potential to use graphical passwords as an alternative authentication mechanism designed to aid memorability and ease of use. The idea of this research is to combine the usability of recognition-based and draw-based graphical passwords with the security of OTP. A new multi-level user-authentication solution known as: Graphical One-Time Password (GOTPass) was proposed and empirically evaluated in terms of usability and security aspects. The usability experiment was conducted during three separate sessions, which took place over five weeks, to assess the efficiency, effectiveness, memorability and user satisfaction of the new scheme. The results showed that users were able to easily create and enter their credentials as well as remember them over time. Eighty-one participants carried out a total of 1,302 login attempts with a 93% success rate and an average login time of 24.5 seconds. With regard to the security evaluation, the research simulated three common types of graphical password attacks (guessing, intersection, and shoulder-surfing). The participants’ task was to act as attackers to try to break into the system. The GOTPass scheme showed a high resistance capability against the attacks, as only 3.3% of the 690 total attempts succeeded in compromising the system.

en_US
dc.description.sponsorshipKing Abdulaziz City for Science and Technologyen_US
dc.language.isoen
dc.publisherUniversity of Plymouth
dc.subjectAuthenticationen_US
dc.subjectGraphical Passwordsen_US
dc.subjectOne-Time Passworden_US
dc.subjectUsable Securityen_US
dc.subject.classificationPhDen_US
dc.titleGRAPHICAL ONE-TIME PASSWORD AUTHENTICATIONen_US
dc.typeThesis
plymouth.versionpublishableen_US
dc.identifier.doihttp://dx.doi.org/10.24382/944
dc.rights.embargoperiodNo embargoen_US
dc.type.qualificationDoctorateen_US
rioxxterms.funderNot availableen_US
rioxxterms.identifier.projectNot availableen_US
rioxxterms.versionNA


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV